Movatterモバイル変換


[0]ホーム

URL:


US20180084002A1 - Malicious hyperlink protection - Google Patents

Malicious hyperlink protection
Download PDF

Info

Publication number
US20180084002A1
US20180084002A1US15/270,838US201615270838AUS2018084002A1US 20180084002 A1US20180084002 A1US 20180084002A1US 201615270838 AUS201615270838 AUS 201615270838AUS 2018084002 A1US2018084002 A1US 2018084002A1
Authority
US
United States
Prior art keywords
hyperlink
file
user
risk
modified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/270,838
Inventor
Oren Shnitzer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Re-Sec Technologies Ltd
Original Assignee
Re-Sec Technologies Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Re-Sec Technologies LtdfiledCriticalRe-Sec Technologies Ltd
Priority to US15/270,838priorityCriticalpatent/US20180084002A1/en
Publication of US20180084002A1publicationCriticalpatent/US20180084002A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method for malicious hyperlink protection, the method may include receiving, by a risk management computer, a first file that is aimed to a computer of a user; storing the first file in a memory of the risk management computer; searching, by the risk management computer, for a hyperlink that is included in the first file and links to target content that is included in a target website; when finding the hyperlink then evaluating, at least partially by the risk management computer, whether the hyperlink imposes a risk; preventing the user from utilizing the hyperlink for accessing the target content before a completion of the evaluating of whether the hyperlink imposes the risk; and wherein when evaluating that the hyperlink imposes the risk then: modifying the file to provide a modified file; wherein the modifying of the file comprises deleting the hyperlink or replacing the hyperlink with a modified hyperlink; wherein the modified hyperlink links to a web entity that differs from the target website; and sending the modified file to the computer of the user.

Description

Claims (18)

We claim:
1. A method for malicious hyperlink protection, the method comprises:
receiving, by a risk management computer, a first file that is aimed to a computer of a user;
storing the first file in a memory of the risk management computer;
searching, by the risk management computer, for a hyperlink that is included in the first file and links to target content that is included in a target website;
when finding the hyperlink then evaluating, at least partially by the risk management computer, whether the hyperlink imposes a risk;
preventing the user from utilizing the hyperlink for accessing the target content before a completion of the evaluating of whether the hyperlink imposes the risk; and
wherein when evaluating that the hyperlink imposes the risk then:
modifying the file to provide a modified file; wherein the modifying of the file comprises deleting the hyperlink or replacing the hyperlink with a modified hyperlink;
wherein the modified hyperlink links to a web entity that differs from the target website; and
sending the modified file to the computer of the user.
2. The method according toclaim 1 wherein the web entity is a landing page; wherein the method comprises generating the landing page to comprise an alert to be displayed to the user when the user utilizes the modified hyperlink.
3. The method according toclaim 1 wherein the web entity is a landing page; wherein the method comprises generating the landing page to comprise an alert to be displayed when the user utilizes the modified hyperlink; wherein the landing page is associated with a script that comprises instructions for accessing the target content that is included in the target website after a predefined delay from a start of the displaying of the alert.
4. The method according toclaim 1 wherein the web entity is a landing page; wherein the method comprises generating the landing page to comprise a request for confirming an access to the target content in the target website; wherein the landing page is associated with a script that comprises instructions for accessing the target content in the target website when the user confirmed the access to the target content in the target website.
5. The method according toclaim 1 wherein the web entity is a landing page; wherein the method comprises generating the landing page to comprise a sanitized version of the target content or comprises a link to the sanitized version of the target content.
6. The method according toclaim 5 wherein the sanitized version of the target content is a non-interactive content of the target content.
7. The method according toclaim 1 wherein the web entity is a landing page; wherein the method comprises generating the landing page while concealing from the user a name of the target web site.
8. The method according toclaim 1 comprising generating the modified hyperlink not to include any identifier of the target website.
9. A method for malicious hyperlink protection, the method comprises:
receiving, in a risk management computer, a first file that is aimed to a computer of a user;
storing the first file in a memory of the risk management computer;
searching, by the risk management computer, for a hyperlink that is included in the first file and links to target content that is included in a target website;
when finding the hyperlink then modifying the file to provide a modified file; wherein the modifying of the file comprises replacing the hyperlink with a modified hyperlink; wherein the modified hyperlink, once utilized by the user, cause the computer of the user to (a) trigger an evaluation of whether the hyperlink imposes a risk and (b) trigger, following the evaluation, a risk mitigation operation when evaluating that the hyperlink imposes the risk; and
sending the modified file to the risk management computer of the user.
10. The method according toclaim 9 wherein the risk mitigation operation comprises preventing the computer of the user from accessing the target content in the target website.
11. The method according toclaim 9 wherein the risk mitigation operation comprises accessing a landing page that comprises an alert to be displayed to the user when the user utilizes the modified hyperlink.
12. The method according toclaim 9 wherein the risk mitigation operation comprises accessing a landing page that comprises an alert to be displayed when the user utilizes the modified hyperlink; wherein the landing page is associated with a script that comprises instructions for accessing the target content that is included in the target website after a predefined delay from a start of the displaying of the alert.
13. The method according toclaim 9 wherein the risk mitigation operation comprises accessing a landing page that comprises a request for confirming an access to the target content in the target website; wherein the landing page is associated with a script that comprises instructions for accessing the target content in the target website when the user confirmed the access to the target content in the target website.
14. The method according toclaim 9 wherein the risk mitigation operation comprises accessing a landing page that comprises a sanitized version of the target content or comprises a link to the sanitized version of the target content.
15. The method according toclaim 14 wherein the sanitized version of the target content is a non-interactive content of the target content.
16. A computer program product that stores instructions that once executed by a computer cause the computer to execute the steps of receiving, by a risk management computer, a first file that is aimed to a computer of a user; storing the first file in a memory of the risk management computer; searching, by the risk management computer, for a hyperlink that is included in the first file and links to target content that is included in a target website; when finding the hyperlink then evaluating, at least partially by the risk management computer, whether the hyperlink imposes a risk; preventing the user from utilizing the hyperlink for accessing the target content before a completion of the evaluating of whether the hyperlink imposes the risk; and wherein when evaluating that the hyperlink imposes the risk then: modifying the file to provide a modified file; wherein the modifying of the file comprises deleting the hyperlink or replacing the hyperlink with a modified hyperlink; wherein the modified hyperlink links to a web entity that differs from the target website; and sending the modified file to the computer of the user.
17. A computer program product that stores instructions that once executed by a risk management computer cause the risk management computer to execute the steps of receiving a first file that is aimed to a computer of a user; storing the first file in a memory of the risk management computer; searching for a hyperlink that is included in the first file and links to target content that is included in a target website; when finding the hyperlink then modifying the file to provide a modified file; wherein the modifying of the file comprises replacing the hyperlink with a modified hyperlink; wherein the modified hyperlink, once utilized by the user, cause the computer of the user to (a) trigger an evaluation of whether the hyperlink imposes a risk and (b) trigger, following the evaluation, a risk mitigation operation when evaluating that the hyperlink imposes the risk; and sending the modified file to the risk management computer of the user.
18. A risk management computer that comprises a memory, a communication module and a processor, wherein the memory is configured to receive and store a first file that is aimed to a computer of a user; wherein the processor is configured to search for a hyperlink that is included in the first file and links to target content that is included in a target website; when finding the hyperlink then at least assist in evaluating whether the hyperlink imposes a risk; preventing the user from utilizing the hyperlink for accessing the target content before a completion of the evaluating of whether the hyperlink imposes the risk; and wherein when evaluating that the hyperlink imposes the risk then the processor is configured to modify the file to provide a modified file; wherein the modifying of the file comprises deleting the hyperlink or replacing the hyperlink with a modified hyperlink; wherein the modified hyperlink links to a web entity that differs from the target website; and wherein the communication module is configured to send the modified file to the computer of the user.
US15/270,8382016-09-202016-09-20Malicious hyperlink protectionAbandonedUS20180084002A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/270,838US20180084002A1 (en)2016-09-202016-09-20Malicious hyperlink protection

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US15/270,838US20180084002A1 (en)2016-09-202016-09-20Malicious hyperlink protection

Publications (1)

Publication NumberPublication Date
US20180084002A1true US20180084002A1 (en)2018-03-22

Family

ID=61620757

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US15/270,838AbandonedUS20180084002A1 (en)2016-09-202016-09-20Malicious hyperlink protection

Country Status (1)

CountryLink
US (1)US20180084002A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20200014721A1 (en)*2018-07-092020-01-09Blackberry LimitedManaging third party url distribution
US20200019643A1 (en)*2018-07-112020-01-16EMC IP Holding Company LLCDynamic modification of information presentation and linkage based on usage patterns and sentiments
US10630721B1 (en)*2019-07-162020-04-21ALSCO Software LLCMonitoring system for detecting and preventing a malicious program code from being uploaded from a client computer to a webpage computer server
WO2021108560A1 (en)*2019-11-272021-06-03Jpmorgan Chase Bank, N.A.Systems and methods for providing pre-emptive intercept warnings for online privacy or security
US11157544B2 (en)2018-09-192021-10-26International Business Machines CorporationOnline site prediction and mitigation
US11196754B1 (en)*2019-06-252021-12-07Ca, Inc.Systems and methods for protecting against malicious content
US20220053008A1 (en)*2016-12-232022-02-17Microsoft Technology Licensing, LlcThreat protection in documents
US11425161B2 (en)*2017-05-222022-08-23Leap In Value S.L.Computer-implemented method, a system and a computer program for identifying malicious URI data items
EP4195082A1 (en)*2021-12-092023-06-14BAE SYSTEMS plcDocument sanitiser
GB2617137A (en)*2022-03-302023-10-04Egress Software Tech Ip LimitedMethod and system for processing data packages
WO2023187351A1 (en)*2022-03-302023-10-05Egress Software Technologies Ip LimitedMethod and system for processing data packages
US11863586B1 (en)*2022-08-302024-01-02Palo Alto Networks, Inc.Inline package name based supply chain attack detection and prevention

Citations (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020013810A1 (en)*2000-04-172002-01-31Hwa Pang HweeElectronic document mapping
US6393468B1 (en)*1997-01-202002-05-21British Telecommunications Public Limited CompanyData access control
US20050050222A1 (en)*2003-08-252005-03-03Microsoft CorporationURL based filtering of electronic communications and web pages
US7370285B1 (en)*2002-07-312008-05-06Opinionlab, Inc.Receiving and reporting page-specific user feedback concerning one or more particular web pages of a website
US20080126232A1 (en)*2006-11-282008-05-29Kevin LeeSystem and method for routing Internet transactions from within an organizational network
US20080208868A1 (en)*2007-02-282008-08-28Dan HubbardSystem and method of controlling access to the internet
US20110321160A1 (en)*2010-06-242011-12-29Mcafee, Inc.Systems and methods to detect malicious media files
US20120102545A1 (en)*2010-10-202012-04-26Mcafee, Inc.Method and system for protecting against unknown malicious activities by determining a reputation of a link
US20120158777A1 (en)*2000-06-062012-06-21Nobuyoshi MorimotoSystem and method for identifying individual users accessing a web site
US20130103944A1 (en)*2011-10-242013-04-25Research In Motion LimitedHypertext Link Verification In Encrypted E-Mail For Mobile Devices
US8601050B2 (en)*1996-06-122013-12-03Michael CarringerSystem and method for generating a modified web page by inline code insertion in response to an information request from a client computer
US20140259158A1 (en)*2013-03-112014-09-11Bank Of America CorporationRisk Ranking Referential Links in Electronic Messages
US20140298460A1 (en)*2013-03-262014-10-02Microsoft CorporationMalicious uniform resource locator detection
US8959630B2 (en)*2004-11-082015-02-17Bt Web Solutions, LlcEnhanced browsing with security scanning
US8984640B1 (en)*2003-12-112015-03-17Radix Holdings, LlcAnti-phishing
US9241009B1 (en)*2012-06-072016-01-19Proofpoint, Inc.Malicious message detection and processing
US9467410B2 (en)*2012-12-202016-10-11Mcafee, Inc.Just-in-time, email embedded URL reputation determination
US9531736B1 (en)*2012-12-242016-12-27Narus, Inc.Detecting malicious HTTP redirections using user browsing activity trees
US9654495B2 (en)*2006-12-012017-05-16Websense, LlcSystem and method of analyzing web addresses
US10027690B2 (en)*2004-04-012018-07-17Fireeye, Inc.Electronic message analysis for malware detection
US10075456B1 (en)*2016-03-042018-09-11Symantec CorporationSystems and methods for detecting exploit-kit landing pages

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8601050B2 (en)*1996-06-122013-12-03Michael CarringerSystem and method for generating a modified web page by inline code insertion in response to an information request from a client computer
US6393468B1 (en)*1997-01-202002-05-21British Telecommunications Public Limited CompanyData access control
US20020013810A1 (en)*2000-04-172002-01-31Hwa Pang HweeElectronic document mapping
US20120158777A1 (en)*2000-06-062012-06-21Nobuyoshi MorimotoSystem and method for identifying individual users accessing a web site
US7370285B1 (en)*2002-07-312008-05-06Opinionlab, Inc.Receiving and reporting page-specific user feedback concerning one or more particular web pages of a website
US20050050222A1 (en)*2003-08-252005-03-03Microsoft CorporationURL based filtering of electronic communications and web pages
US8984640B1 (en)*2003-12-112015-03-17Radix Holdings, LlcAnti-phishing
US10027690B2 (en)*2004-04-012018-07-17Fireeye, Inc.Electronic message analysis for malware detection
US8959630B2 (en)*2004-11-082015-02-17Bt Web Solutions, LlcEnhanced browsing with security scanning
US20080126232A1 (en)*2006-11-282008-05-29Kevin LeeSystem and method for routing Internet transactions from within an organizational network
US9654495B2 (en)*2006-12-012017-05-16Websense, LlcSystem and method of analyzing web addresses
US20080208868A1 (en)*2007-02-282008-08-28Dan HubbardSystem and method of controlling access to the internet
US20110321160A1 (en)*2010-06-242011-12-29Mcafee, Inc.Systems and methods to detect malicious media files
US20120102545A1 (en)*2010-10-202012-04-26Mcafee, Inc.Method and system for protecting against unknown malicious activities by determining a reputation of a link
US20130103944A1 (en)*2011-10-242013-04-25Research In Motion LimitedHypertext Link Verification In Encrypted E-Mail For Mobile Devices
US9241009B1 (en)*2012-06-072016-01-19Proofpoint, Inc.Malicious message detection and processing
US9467410B2 (en)*2012-12-202016-10-11Mcafee, Inc.Just-in-time, email embedded URL reputation determination
US9531736B1 (en)*2012-12-242016-12-27Narus, Inc.Detecting malicious HTTP redirections using user browsing activity trees
US20140259158A1 (en)*2013-03-112014-09-11Bank Of America CorporationRisk Ranking Referential Links in Electronic Messages
US20160226897A1 (en)*2013-03-112016-08-04Bank Of America CorporationRisk Ranking Referential Links in Electronic Messages
US20140298460A1 (en)*2013-03-262014-10-02Microsoft CorporationMalicious uniform resource locator detection
US10075456B1 (en)*2016-03-042018-09-11Symantec CorporationSystems and methods for detecting exploit-kit landing pages

Cited By (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11785027B2 (en)*2016-12-232023-10-10Microsoft Technology Licensing, LlcThreat protection in documents
US20220053008A1 (en)*2016-12-232022-02-17Microsoft Technology Licensing, LlcThreat protection in documents
US11425161B2 (en)*2017-05-222022-08-23Leap In Value S.L.Computer-implemented method, a system and a computer program for identifying malicious URI data items
US11388192B2 (en)*2018-07-092022-07-12Blackberry LimitedManaging third party URL distribution
US11665198B2 (en)*2018-07-092023-05-30Blackberry LimitedManaging third party URL distribution
US20200014721A1 (en)*2018-07-092020-01-09Blackberry LimitedManaging third party url distribution
US20220279018A1 (en)*2018-07-092022-09-01Blackberry LimitedManaging third party url distribution
US20200019643A1 (en)*2018-07-112020-01-16EMC IP Holding Company LLCDynamic modification of information presentation and linkage based on usage patterns and sentiments
US10776412B2 (en)*2018-07-112020-09-15EMC IP Holding Company LLCDynamic modification of information presentation and linkage based on usage patterns and sentiments
US11157544B2 (en)2018-09-192021-10-26International Business Machines CorporationOnline site prediction and mitigation
US11196754B1 (en)*2019-06-252021-12-07Ca, Inc.Systems and methods for protecting against malicious content
US10630721B1 (en)*2019-07-162020-04-21ALSCO Software LLCMonitoring system for detecting and preventing a malicious program code from being uploaded from a client computer to a webpage computer server
US11362995B2 (en)2019-11-272022-06-14Jpmorgan Chase Bank, N.A.Systems and methods for providing pre-emptive intercept warnings for online privacy or security
US11652795B2 (en)2019-11-272023-05-16Jpmorgan Chase Bank, N.A.Systems and methods for providing pre-emptive intercept warnings for online privacy or security
WO2021108560A1 (en)*2019-11-272021-06-03Jpmorgan Chase Bank, N.A.Systems and methods for providing pre-emptive intercept warnings for online privacy or security
EP4195082A1 (en)*2021-12-092023-06-14BAE SYSTEMS plcDocument sanitiser
GB2617137A (en)*2022-03-302023-10-04Egress Software Tech Ip LimitedMethod and system for processing data packages
WO2023187351A1 (en)*2022-03-302023-10-05Egress Software Technologies Ip LimitedMethod and system for processing data packages
US12388846B2 (en)*2022-03-302025-08-12Egress Software Technologies Ip LimitedMethod and system for processing data packages
US11863586B1 (en)*2022-08-302024-01-02Palo Alto Networks, Inc.Inline package name based supply chain attack detection and prevention
US12132759B2 (en)2022-08-302024-10-29Palo Alto Networks, Inc.Inline package name based supply chain attack detection and prevention

Similar Documents

PublicationPublication DateTitle
US20180084002A1 (en)Malicious hyperlink protection
US11741222B2 (en)Sandbox environment for document preview and analysis
US10664602B2 (en)Determining malware prevention based on retrospective content scan
US20210234892A1 (en)Metadata-Based Detection and Prevention of Phishing Attacks
US9846776B1 (en)System and method for detecting file altering behaviors pertaining to a malicious attack
US10523609B1 (en)Multi-vector malware detection and analysis
US20220078197A1 (en)Using message context to evaluate security of requested data
US8950005B1 (en)Method and system for protecting content of sensitive web applications
US20190245885A1 (en)Methods and Systems for Malicious Message Detection and Processing
US8930805B2 (en)Browser preview
US12132757B2 (en)Preventing cloud-based phishing attacks using shared documents with malicious links
US8839401B2 (en)Malicious message detection and processing
AU2016307179B2 (en)Using multiple layers of policy management to manage risk
US20190073475A1 (en)Ransomware Mitigation System
US11297024B1 (en)Chat-based systems and methods for data loss prevention
US9686119B2 (en)System, method and computer program product for scanning portions of data
Hutchinson et al.Are we really protected? An investigation into the play protect service
US20240364793A1 (en)Methods for controlling tracking elements of a web page and related electronic devices
US11580248B2 (en)Data loss prevention
US9245132B1 (en)Systems and methods for data loss prevention
US11516249B1 (en)On-demand scanning of e-mail attachments
Orunsolu et al.A Lightweight Anti-Phishing Technique for Mobile Phone.
Kywe et al.Dissecting developer policy violating apps: characterization and detection
US12301587B1 (en)Automatic assessment of potentially malicious web content via web page investigator
KYWE et al.Dissecting developer policy violating apps: Characterization and detection.(2016)

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp